New privacy threat on 3G, 4G, and upcoming 5G AKA protocols
Mobile communications are used by more than two-thirds of the world population who
expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) …
expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) …
Improving 4G/5G air interface security: A survey of existing attacks on different LTE layers
C Yu, S Chen, F Wang, Z Wei - Computer Networks, 2021 - Elsevier
Abstract The 4G/Long Term Evolution (LTE) has become the dominant mobile access
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
technology worldwide so far, while the development of the 5G/NR (New Radio) cellular …
LTE authentication protocol (EPS-AKA) weaknesses solution
MA Abdrabou, ADE Elbayoumy… - 2015 IEEE seventh …, 2015 - ieeexplore.ieee.org
Extensible Authentication Protocol (EAP) is an authentication framework in Long Term
Evolution (LTE) networks. EAP-AKA is one of the methods of EAP which uses the …
Evolution (LTE) networks. EAP-AKA is one of the methods of EAP which uses the …
A console GRID leveraged authentication and key agreement mechanism for LTE/SAE
Growing popularity of multimedia applications, pervasive connectivity, higher bandwidth,
and euphoric technology penetration among bulk of the human race that happens to be …
and euphoric technology penetration among bulk of the human race that happens to be …
A fault tolerant mechanism for UE authentication in 5G networks
Abstract Generally, the 5th Generation (5G) network will be soon available in the near future.
It will be one with the feature that some of its network functions are handled by Virtual …
It will be one with the feature that some of its network functions are handled by Virtual …
A secure wireless communication system integrating RSA, Diffie–Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment
In broadband wireless technology, due to having many salient advantages, such as high
data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one …
data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one …
Robust pre-authentication protocol for wireless network
MA Abdrabou - 2017 13th International Computer Engineering …, 2017 - ieeexplore.ieee.org
User authentication is very important in mobile networks; Evolved Packet System
Authentication and Key Agreement (EPS-AKA) protocol used in 4 th generation (LTE) …
Authentication and Key Agreement (EPS-AKA) protocol used in 4 th generation (LTE) …
E-ANDSF-based base station selection scheme by using MLP in untrusted environments
In this paper, we design an enhanced access network discovery and selection function
(ANDSF), named E-ANDSF, which provides previous mobile access gateway (PMAG) with …
(ANDSF), named E-ANDSF, which provides previous mobile access gateway (PMAG) with …
Improving LTE EPS-AKA using the security request vector
CG Apostol, C Racuciu - 2015 7th International Conference on …, 2015 - ieeexplore.ieee.org
Nowadays the telecommunications industry focuses on two user requirements: increased
data-rates at high speed mobility and robust network security. The emerging technology for …
data-rates at high speed mobility and robust network security. The emerging technology for …
Improving security level of LTE access procedure by using short-life shared key
To ensure secure mobile communication, the communicating entities must know their mutual
identities. The entities which need to be identified in a mobile communication system are …
identities. The entities which need to be identified in a mobile communication system are …